78c48f8cc156f6b0e6ed757fd9ba3592199341529d6941b07c5d49773f51b69a
fba82e9b3f3d3f8b8cc9162bc505af521a3cf63f
f609612e25434957ac3bb04957a97146
5.10.127-1
libcpupower1_5.10.127-1_i386.deb
518
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.7)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
libcpupower.so.1 /usr/lib/i386-linux-gnu/libcpupower.so.0.0.1 | 21984 | 0 | ||
libcpupower.so.1 /usr/lib/i386-linux-gnu/libcpupower.so.1 | 21984 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33655 | 78 | DSA DSA-5191-1 | |
CVE-2022-2318 | 0 | DSA DSA-5191-1 | |
CVE-2022-26365 | 0 | DSA DSA-5191-1 | |
CVE-2022-33740 | 0 | DSA DSA-5191-1 | |
CVE-2022-33741 | 0 | DSA DSA-5191-1 | |
CVE-2022-33742 | 0 | DSA DSA-5191-1 | |
CVE-2022-33743 | 0 | DSA DSA-5191-1 | |
CVE-2022-33744 | 0 | DSA DSA-5191-1 | |
CVE-2022-34918 | 0 | DSA DSA-5191-1 |
{ "sha256": "78c48f8cc156f6b0e6ed757fd9ba3592199341529d6941b07c5d49773f51b69a", "sha1": "fba82e9b3f3d3f8b8cc9162bc505af521a3cf63f", "md5": "f609612e25434957ac3bb04957a97146", "type": "DEB", "arch": "I386", "name": "libcpupower1", "filename": "libcpupower1_5.10.127-1_i386.deb", "size": 518, "description": "CPU frequency and voltage scaling tools for Linux (libraries)\nlibcpupower is a library for inspecting and controlling cpufreq and\ncpuidle tunables.\n\nThis package contains the shared library.", "url": "https://www.kernel.org/", "version": "5.10.127-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.7)", "applications": [ { "path": "/usr/lib/i386-linux-gnu/libcpupower.so.0.0.1", "sha256": "02184f9ae550e6395f744da5a7dddbbe5e89ad400d07fc4eb8cdc4e8cfde3c0b", "sha1": "ddc6418a4a815908a2c404c19b16c5b5d87341f7", "md5": "3ac378bb2c0e02d73596736940d7fc2e", "name": "libcpupower.so.1", "size": 21984, "description": null, "package": 3818312, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T03:08:24+00:00", "updated_at": "2022-07-02T03:08:24+00:00", "deleted_at": null }, { "path": "/usr/lib/i386-linux-gnu/libcpupower.so.1", "sha256": "02184f9ae550e6395f744da5a7dddbbe5e89ad400d07fc4eb8cdc4e8cfde3c0b", "sha1": "ddc6418a4a815908a2c404c19b16c5b5d87341f7", "md5": "3ac378bb2c0e02d73596736940d7fc2e", "name": "libcpupower.so.1", "size": 21984, "description": null, "package": 3818312, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T03:08:24+00:00", "updated_at": "2022-07-02T03:08:24+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33655", "risk": 78, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:15:37+00:00", "updated_at": "2022-07-27T20:15:37+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:10+00:00", "updated_at": "2022-07-27T20:16:10+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:42+00:00", "updated_at": "2022-07-27T20:16:42+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:15+00:00", "updated_at": "2022-07-27T20:17:15+00:00" }, { "name": "CVE-2022-33741", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:47+00:00", "updated_at": "2022-07-27T20:17:47+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:19+00:00", "updated_at": "2022-07-27T20:18:19+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:50+00:00", "updated_at": "2022-07-27T20:18:50+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:19+00:00", "updated_at": "2022-07-27T20:19:19+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:51+00:00", "updated_at": "2022-07-27T20:19:51+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-01T06:37:52+00:00", "updated_at": "2022-07-02T02:08:24+00:00", "deleted_at": null }